🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Missing Update
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Missing Update
This page lists
23101 vulnerabilities
in this category.
Critical: 1474
High: 12458
Medium: 8395
Low: 770
Information: 4
Vulnerability Name
CVE
CWE
Severity
Dot CMS Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-3188)
CVE-2017-3188
CWE-22
Medium
MySQL CVE-2017-3238 Vulnerability (CVE-2017-3238)
CVE-2017-3238
-
Medium
MySQL CVE-2017-3243 Vulnerability (CVE-2017-3243)
CVE-2017-3243
-
Medium
MySQL CVE-2017-3244 Vulnerability (CVE-2017-3244)
CVE-2017-3244
-
Medium
GlassFish CVE-2017-3247 Vulnerability (CVE-2017-3247)
CVE-2017-3247
-
Medium
MySQL CVE-2017-3251 Vulnerability (CVE-2017-3251)
CVE-2017-3251
-
Medium
MySQL Improper Input Validation Vulnerability (CVE-2017-3256)
CVE-2017-3256
CWE-20
Medium
MySQL Improper Privilege Management Vulnerability (CVE-2017-3257)
CVE-2017-3257
CWE-269
Medium
MySQL Improper Input Validation Vulnerability (CVE-2017-3258)
CVE-2017-3258
CWE-20
Medium
MySQL CVE-2017-3265 Vulnerability (CVE-2017-3265)
CVE-2017-3265
-
Medium
MySQL Improper Input Validation Vulnerability (CVE-2017-3273)
CVE-2017-3273
CWE-20
Medium
MySQL CVE-2017-3291 Vulnerability (CVE-2017-3291)
CVE-2017-3291
-
Medium
MySQL CVE-2017-3312 Vulnerability (CVE-2017-3312)
CVE-2017-3312
-
Medium
MySQL CVE-2017-3462 Vulnerability (CVE-2017-3462)
CVE-2017-3462
-
Medium
MySQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-3313)
CVE-2017-3313
CWE-200
Medium
MySQL CVE-2017-3317 Vulnerability (CVE-2017-3317)
CVE-2017-3317
-
Medium
MySQL CVE-2017-3318 Vulnerability (CVE-2017-3318)
CVE-2017-3318
-
Medium
MySQL CVE-2017-3331 Vulnerability (CVE-2017-3331)
CVE-2017-3331
-
Medium
MySQL CVE-2017-3452 Vulnerability (CVE-2017-3452)
CVE-2017-3452
-
Medium
MySQL CVE-2017-3453 Vulnerability (CVE-2017-3453)
CVE-2017-3453
-
Medium
MySQL CVE-2017-3454 Vulnerability (CVE-2017-3454)
CVE-2017-3454
-
Medium
MySQL CVE-2017-3455 Vulnerability (CVE-2017-3455)
CVE-2017-3455
-
Medium
MySQL CVE-2017-3456 Vulnerability (CVE-2017-3456)
CVE-2017-3456
-
Medium
MySQL CVE-2017-3457 Vulnerability (CVE-2017-3457)
CVE-2017-3457
-
Medium
MySQL CVE-2017-3458 Vulnerability (CVE-2017-3458)
CVE-2017-3458
-
Medium
MySQL CVE-2017-3459 Vulnerability (CVE-2017-3459)
CVE-2017-3459
-
Medium
MySQL CVE-2017-3460 Vulnerability (CVE-2017-3460)
CVE-2017-3460
-
Medium
MySQL CVE-2017-3461 Vulnerability (CVE-2017-3461)
CVE-2017-3461
-
Medium
Atlassian Confluence Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2016-6283)
CVE-2016-6283
CWE-707
Medium
PHP Integer Overflow or Wraparound Vulnerability (CVE-2016-6207)
CVE-2016-6207
CWE-190
Medium
Oracle Database Server CVE-2015-0455 Vulnerability (CVE-2015-0455)
CVE-2015-0455
-
Medium
Jboss EAP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5188)
CVE-2015-5188
CWE-352
Medium
Oracle Database Server CVE-2015-4888 Vulnerability (CVE-2015-4888)
CVE-2015-4888
-
Medium
Oracle Database Server CVE-2015-4900 Vulnerability (CVE-2015-4900)
CVE-2015-4900
-
Medium
MySQL CVE-2015-4904 Vulnerability (CVE-2015-4904)
CVE-2015-4904
-
Medium
MySQL CVE-2015-4905 Vulnerability (CVE-2015-4905)
CVE-2015-4905
-
Medium
Oracle Database Server CVE-2015-4921 Vulnerability (CVE-2015-4921)
CVE-2015-4921
-
Medium
Oracle Database Server CVE-2015-4923 Vulnerability (CVE-2015-4923)
CVE-2015-4923
-
Medium
Oracle Database Server CVE-2015-4925 Vulnerability (CVE-2015-4925)
CVE-2015-4925
-
Medium
silverstripeCMS Other Vulnerability (CVE-2015-5062)
CVE-2015-5062
-
Medium
silverstripeCMS Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-5063)
CVE-2015-5063
CWE-707
Medium
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-5078)
CVE-2015-5078
CWE-138
Medium
Django Improper Input Validation Vulnerability (CVE-2015-5144)
CVE-2015-5144
CWE-20
Medium
Apache Tomcat Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-5174)
CVE-2015-5174
CWE-22
Medium
Jboss EAP 7PK - Security Features Vulnerability (CVE-2015-5178)
CVE-2015-5178
-
Medium
Jboss EAP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-5220)
CVE-2015-5220
CWE-119
Medium
MySQL CVE-2015-4870 Vulnerability (CVE-2015-4870)
CVE-2015-4870
-
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5264)
CVE-2015-5264
CWE-264
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5265)
CVE-2015-5265
CWE-264
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5266)
CVE-2015-5266
CWE-264
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5268)
CVE-2015-5268
CWE-264
Medium
Moodle Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-5269)
CVE-2015-5269
CWE-707
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5272)
CVE-2015-5272
CWE-264
Medium
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5288)
CVE-2015-5288
CWE-200
Medium
PostgreSQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-5289)
CVE-2015-5289
CWE-119
Medium
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5317)
CVE-2015-5317
CWE-200
Medium
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5318)
CVE-2015-5318
CWE-352
Medium
Jenkins Other Vulnerability (CVE-2015-5319)
CVE-2015-5319
-
Medium
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5320)
CVE-2015-5320
CWE-200
Medium
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5321)
CVE-2015-5321
CWE-200
Medium
MySQL CVE-2015-4879 Vulnerability (CVE-2015-4879)
CVE-2015-4879
-
Medium
MySQL CVE-2015-4866 Vulnerability (CVE-2015-4866)
CVE-2015-4866
-
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5323)
CVE-2015-5323
CWE-264
Medium
concrete5 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-4721)
CVE-2015-4721
CWE-707
Medium
Dolibarr Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-3935)
CVE-2015-3935
CWE-707
Medium
Django Other Vulnerability (CVE-2015-3982)
CVE-2015-3982
-
Medium
concrete5 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-3989)
CVE-2015-3989
CWE-707
Medium
RubyGems Improper Input Validation Vulnerability (CVE-2015-4020)
CVE-2015-4020
CWE-20
Medium
PHP Numeric Errors Vulnerability (CVE-2015-4021)
CVE-2015-4021
-
Medium
PHP Resource Management Errors Vulnerability (CVE-2015-4024)
CVE-2015-4024
-
Medium
PHP Improper Input Validation Vulnerability (CVE-2015-4148)
CVE-2015-4148
CWE-20
Medium
MyBB Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-4552)
CVE-2015-4552
CWE-707
Medium
PHP Improper Input Validation Vulnerability (CVE-2015-4598)
CVE-2015-4598
CWE-20
Medium
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-4628)
CVE-2015-4628
CWE-138
Medium
Opencart Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-4671)
CVE-2015-4671
CWE-707
Medium
«
1
...
210
211
212
...
309
»